Kiuwan logo

AppSec Blog

Keep up with the latest news on cybersecurity, technical trends, and programming best practices.

Recent Posts

The Guide to Effective Application Inventory Management

As a company’s applications and digital infrastructure grow in complexity, it will need a more methodological approach to management to maintain back-end functionality. Companies can benefit from visualizing their application architecture and its dependencies...
Inventory management guide graphic

SOAR: The Future of IT Security

Today’s security professionals face a relentless barrage of alerts, a widening cybersecurity skills gap, and the constant pressure to do more with less. Manually triaging alerts, investigating incidents, and coordinating responses across disparate secur...
Future of IT security graphic

Why Cybercriminals Love REST

Many applications provide a services layer (to other applications, to a presentation layer, etc.). Or, they consume services exposed by third-parties (not necessarily trusted). A REST model is a simple, widely-used way for designing such service layers. This ...
Bad guys love REST graphic

6 Current Cybersecurity Trends

As new technologies and big data deliver previously unimagined connections and conveniences, the shadow side of cyber threats is also growing. Cybercriminals can scale to unprecedented levels using artificial intelligence (AI) and launch sophisticated attacks...
cybersecurity graphic

Understanding CWE: Common Weakness Enumeration

Common Weakness Enumeration (CWE) is a software and hardware weaknesses classification system. It’s an extension of the Common Vulnerabilities and Exposures (CVE) list compiled by MITRE. This federally funded, non-profit organization manages research and deve...

Secure Your Code,
Protect Your Business

Detect vulnerabilities early and strengthen your security. Take control now to safeguard your app. See Kiuwan in action!
Application-inventory
© 2025 Kiuwan. All Rights Reserved.